A potential DoS vulnerability was discovered in Gitlab CE/EE versions starting from 10.7 before 15.1.5, all versions starting from 15.2 before 15.2.3, all versions starting from 15.3 before 15.3.1 allowed an attacker to trigger high CPU usage via a special crafted input added in the Commit message field.
The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.
Link | Tags |
---|---|
https://gitlab.com/gitlab-org/gitlab/-/issues/363734 | third party advisory |
https://hackerone.com/reports/1584156 | third party advisory permissions required |
https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2908.json | third party advisory |